ࡱ> M P|bjbj== WW&q]lnnn4;;;h<$2<THX==p>>r>.AtA$AWWWWWWW$(Z H\W]nA@"@@AAWB>r>ZXBBBA>R>pWBAWB8BCj2KL"KQ>= !;AM2KQ4X0HXNJN^AN^KQBRECOMMENDATION ITU-R BT.810* Conditional-access broadcasting systems (1992) The ITU Radiocommunication Assembly, considering a) that there is a growing demand in several countries to protect broadcast programmes against unauthorized reception; b) that an efficient way of ensuring such a protection is to implement conditional-access broadcasting systems; c) that examples of conditional-access broadcasting systems have been designed and are operated for terrestrial, cable and satellite television, as well as Teletext and data services; d) that it is desirable to limit the number of different conditional-access systems while taking into account the different requirements of various broadcast services and transmission systems; e) that putting as much common elements of conditional access as possible into the receivers at the outset would give the greatest potential to the general public to access protected services at a reduced equipment cost; f) that copyright owners, programme suppliers and service providers desire highly secure broadcast/distribution networks to allow protection of their programmes through access control, recommends that conditional-access systems for broadcasting services should: be highly secure, share the largest number of common elements in the receiver, and be designed according to the fundamental principles listed in Annex 1. ANNEX 1 Fundamental principles for conditional-access broadcasting systems 1 Introduction The following principles apply generally to the delivery of current and future television services, sound programme services as well as Teletext and data broadcasting services. These principles apply for broadcast/delivery to consumers over terrestrial, cable, satellite, pre-recorded and other alternative media.* 2 Component of a conditional-access system There are two distinct, and in many cases independent, components in a conditional-access system, each of which is a distinct information process. These two components are introduced below and are defined in Appendix 1. 2.1 Scrambling This is the process of rendering the content of a service to have no value to unauthorized users by changing certain of its characteristics under the control of the conditional-access system at the sending end. The content of a service may be programme or other content such as data. 2.2 Access control This is a provision of information to enable authorized users to descramble the service. The availability of this information is controlled by the conditional-access system. Between the transmitter and the receiver(s), this information is structured in secure messages multiplexed with the signal itself. At the receiving end(s), these messages are interpreted by the access control system in order to control the descrambling of the signal in the authorized receiver(s). 3 The requirements to be satisfied by a conditional-access control system 3.1 Quality The scrambling and descrambling processes must not alter perceptibly the quality of the received picture, sound and data signals. 3.2 Security The security of a system is the degree of difficulty encountered by an unauthorized user in attempting to gain access to the service. Security may be breached in two ways representing two aspects of difficulty: descrambling the signal without reference to the access control process. This is a function of the nature of the services and the scrambling method. Future television, sound and data broadcasting services are likely to be predominantly digital in nature and thus will allow for highly secure scrambling processes; obtaining the access control key* in an unauthorized manner. This is a function of the security of the algorithms used and the method of key distribution. 3.3 Universal conditional access Access is made available, to any authorized user meeting the conditions for access, via a common or universal scrambling algorithm. Universal conditional access simply means that everyone has access by using common processes and equipment, following common and user-friendly rules and procedures in order to comply with the access conditions set by a producer, provider or distributor. This will encourage the wider application of conditional-access services through simple, low cost, and flexible consumer equipment. Universal conditional access implies that descrambling would be common to all receivers, based on a standard scrambling algorithm, independent of delivery media used, and would still allow competition through company-specific implementations. 3.4 End-to-end content protection End-to-end protection in distributing television, sound and data broadcasting services is the protection of content (programme or otherwise) and of access-related information (control or data) from origination to end, throughout delivery. Protection begins at point of origination and is maintained through to point of presentation* to consumer. This avoids the defeat of highly secure transmission systems through too easy a recording of programme content at home. Thus, from any point of origination, end-to-end protection ensures that information, once concealed, remains concealed throughout all intermediary stages of the distribution system until it reaches the receiver where access will depend on a user meeting the conditions imposed by the originator or service distributor. In transit or in storage, protected content or other information never appears clear at any point or at any time until accessed by an authorized user. Thus, all transmittal and storage of content will be as is. This imposes no constraint on any intermediaries implementing their own protection envelope around the protected information provided they maintain its integrity, i.e., keep it intact as is. As content entering a point of origination may only be scrambled once, the scrambled content is sent as is. The scrambling key, however, is sent under control of a key distribution strategy, typically encrypted by a distribution key and sent to a consumers receiver to be stored encrypted with scrambling keys from various points of origination. 3.5 Access modes A conditional-access system will be more effective if there is a range of access modes. Examples are: period availabilityauthorization runs from a starting time to a finishing time; programme or service itemavailability is for a specific service item, whether or not it is completely used; service charge (commonly called pay per view)the charge or use of credit is proportional to the duration of use and/or the value of the service involved. The access modes need to be variable with respect to several parameters, for example: time; various segments of the service; groups of intended users. 3.6 Equipment standardization To provide maximum economy of manufacturing scale for receiving equipment and to simplify management and maintenance: common equipment should be standardized so that it can cater for as many service options as possible; a consumers receiver architecture must be flexible to implement distribution key and session key encryption/decryption facilities as well as descrambling key facilities in configurations ranging from buried and detachable processing units in the receiver to a portable personal intelligent security module (or smart card) with built-in secret session keys and personal code recognition logic. 3.7 Access management The definition of conditional access is based on the formal concept of entitlement to access, which can be implemented in various forms. An entitlement gives to its holder an authorization to access the related service. Uneconomic use of the resources due to management or transmission overheads should be avoided. 3.8 Avoidance of impairments to the service The following two types of impairment are significant: impairment to the finally available service due to the scrambling/descrambling process; impairments due to faulty or unreliable acquisition of the access control data. 3.9 Interaction with digital processing It should be noted that scrambling processes may severely limit the possibility for further processing including bit-rate reduction. 3.10 Effect control The system could allow for a range of signal intelligibility at the choice of the programme supplier as part of his marketing strategy. 4 General description of a conditional-access system 4.1 General Conditional access requires that the information must be scrambled before it is broadcast. This process is under the control of a scrambling sequence obtained from a pseudo-random generator. The descrambling process at the receiving end requires the same sequence (in this case the descrambling sequence) to recover the original signal. To provide this sequence and to ensure synchronism between the sending and receiving processes, the starting condition of the pseudo-random bit stream generator is controlled by an initialization word. The detailed structure of this process is given in Fig. 1. 4.2 Initialization word Conditional access to a service component is in fact equivalent to conditional access to the initialization word, which has two components: the control word and the initialization modifier. 4.3 Control word The control word is the basic element of security. Its value is chosen arbitrarily and it may be changed during the service operation to enhance security. The control word is communicated to the receiver as follows: at the sending end, according to the access mode in use, an encryption algorithm supplies encrypted versions of the control word, which is multiplexed with the signal itself. These are the access entitlement checking messages; at the receiving end, the access control equipment applies the inverse algorithm to regenerate the control word if all the access conditions have been met. The security module(s) in the receiver(s) could also perform cryptographic checksum computation and verification for ensuring integrity. 4.4 Initialization modifier The initialization modifier is used in order to impose sufficiently short scrambling sequences to provide security, while avoiding the need for too frequent calculation of the control word. Thus, the use of different initialization modifiers for each structural unit of scrambled information causes the initialization word to change sufficiently frequently. This initialization modifier is also broadcast as part of the signal. 4.5 Control word index To operate a segmented service, it is necessary to manage several related control words. These are identified by means of indices. The control word index used to access a unit of scrambled information must be obtainable from the transmitted signal.  Note 1 Two encrypters and decrypters are shown in this figure for clarity. In practice, only one of each may be necessary if the encryption algorithm controlled by the authorization key and the one controlled by the distribution key are the same. Note 2 At the receiving end, the security mechanisms are performed inside the security module(s). 5 Access entitlement checking messages Each of these messages comprises: the control word index; a control word change flag: a change of state indicates a change of value of the control word; an authorization pointer which identifies the authorization key located in the receiver security module to which the message is addressed; a control parameter which supplies value (e.g. date, price, etc.) for comparison limits set to these values, in the receiver security module, called the authorization parameters; the encrypted control word. In order to descramble a unit of information, the receiver must previously have acquired the control word from an access entitlement checking message bearing the appropriate index. For optimum efficiency, access entitlement checking messages relating to the same control word but corresponding either to different user groups or to different types of access control equipment should be grouped under the same index. Although this is not its only application, the indexing system described above enables the advance transmission of entitlement checking messages. The conditional access equipment creates a table of active control words which is updated by the access entitlement checking messages independently of the scrambled data. To identify the correct control word, the descrambling device supplies the access control equipment with the corresponding index. The management of this table is a part of the facilities provided at the interface between the descrambler and the access control equipment. 6 Access entitlement management messages The processing of an access entitlement management message validates or provides the entitlement. This process takes place within the security module associated with a cryptographic calculation involving a distribution key. This distribution key is used to encrypt and decrypt messages and/or authorization keys addressed to individual receivers. The corresponding cryptograms constitute the validation signal and are carried as part of the access entitlement management message. In conditional-access broadcasting systems, the access management messages may be broadcast. This is known as over-air addressing. The cycle time associated with the distribution of over-air keys may be significantly reduced by the application of the principles of shared key encryption. The access management messages may also be distributed by other media. An example of operation is as follows. In the case of payment, per unit of time or per programme, the management messages can convey an encrypted cost code, transmitted as part of the service. The credit may be held in the receiver and may take the form of encrypted money tokens which are transmitted as part of an over-air addressing service. Alternatively credit may take the form of stored money tokens distributed by other means. Payment consists of decrementing the stored credit according to the received cost code. 7 Access control equipment This equipment includes a security module that is supplied with entitlement checking messages. This module may be buried or detachable (both allowing down loadable decryption algorithms). In the former case, access is permitted on a receiver basis whereas in the case of the detachable module (for example, smart card) access does not need to be constrained to a specific television set. The access control equipment communicates with the descrambler through a standardized physical interface and logic circuits. The standardization of this interface is important in order to permit: the independence of the security module and the descrambling function built into the receiver; further development of the access control equipment. If the security module contains an authorization with the same identifier as the authorization pointer in the entitlement checking message, it provides a control word if, in addition, the control parameters fulfil the conditions of the received authorization parameters. These may include: a date requirement, with the date in the control parameter falling between the starting and expiry dates in the authorization parameter; a price requirement by which an authorization may be provided only if a charge is accepted by the security module. A transaction involving the security module may include three distinct stages: preliminary instructions, if present (e.g. password, user acceptance, etc.); operating instructions using the security module; result processing (e.g. delivery of control word). Because a variety of security modules may be used, it would be desirable for the access control equipment to be independent of specific transactions. This independence can be provided if the access control equipment can interpret a sequence of instructions arranged in a specific language and transmitted within specific messages. APPENDIX 1 Some terms and definitions related to conditional-access broadcasting systems Scrambling [in broadcasting] (Embrouillage, aleatorizacin) Alteration of the characteristics of a broadcast vision/sound/data signal in order to prevent unauthorized reception of the information in a clear form. This alteration is a specified process under the control of the conditional-access system (sending end). Descrambling [in broadcasting] (Dsembrouillage, desaleatorizacin) Restoration of the characteristics of a broadcast vision/sound/data signal in order to allow reception of the information in a clear form. This restoration is a specified process under the control of the conditional-access system (receiving end). NOTE1The terms scrambling and descrambling are applicable to both analogue and digital signals. NOTE2The terms should not be used to describe processes such as energy dispersal in a satellite system. Conditional access A user accesses a protected service by interacting via a receiver security module, secure module or decoder. If, in session, all the access conditions are met, authorization occurs, the scrambling key is released, and the content is descrambled. Subscriber authentication, account confirmation, and validation of service availability or other programme control parameters activates the session encryption/decryption key to let the session conclude the authorization process. Conditional-access control The function of the conditional-access control at the sending end is to generate the scrambling control signals and the keys associated with the service. The function of the conditional-access control at the receiving end is to produce the descrambling control signals in conjunction with the keys associated with the service. Encryption and decryption are terms used for methods which are used to protect (and interpret) some of the information within the access-related messages which have to be transmitted from the sending end to the receiving end of the conditional-access control functions. Point of origination This is the point in a distribution system where programme or other content first becomes a signal in its final broadcasting/distribution format. It marks the start of end-to-end protection. Entry content may be any form, not necessarily a humanly sensible form. The content input need not itself be intelligible. Point of presentation This is the point where programme or other content last occurs as a signal in a distribution system before it exists in a humanly sensible form at the receivers screen and speakers. It marks the output from end-to-end protection. NOTE1The copyright owners, service providers, and distributors form a huge hierarchy of many possible points of origination in a flow of information to a consumer and thus in the flow of scrambled content and encrypted keys to a consumer. The point of origination ought to begin with a copyright holder or producer. In practice, most points of origination will be simply the points of entry wherever they may be in the system for business and operational reasons. While there may be many such points of entry, each is a unique and independent point from which the information can be consistently maintained in whatever format it may be input all the way through to a consumer. APPENDIX 2 Examples of implementation of a conditional-access system Page organized Teletext systemsData broadcasting systemsMAC/packet familyReference in Annex 1 Teletext system A Teletext system BIndependent data lines in Teletext system BLayers 1 to 4 of Teletext system C adopted in France(C-MAC/packet and D2-MAC/packet)Digital sub-carrier/NTSCScrambling process 4.1Exclusive-OR combination of the data bytes with the bytes of a pseudo-random generator. An interpretation byte in the header indicates whether the record is scrambled or notExclusive-OR combination of the data bytes with the bytes of a pseudo-random generator. Packet 27 links designate the page as scrambledExclusive-OR combination of the data bytes with bytes from a scrambling stream generator. Regular occurrence of user-data-key blocks designates the service as being scrambledExclusive-OR combination of the data bytes with the bytes of a pseudo-random generator. A byte in the initialization modifier indicates whether the data group is scrambled or not. Data groups with GT = 0 or1 are not scrambledPicture: double cut component rotation or single cut line rotation under the control of a pseudo-random generator Sound: exclusive-OR combination bit by bit of the data bits with the bits of a continuously running pseudo-random generatorPicture: line rotation, line permutation, or a combination of the two methods controlled by a pseudo-random generator Sound: exclusive-OR combination bit by bit of the data bits, with the bits of a continuously running pseudo-random generatorPseudo-random generator 4.1Combination of three multi-stage linear feedback shift registersUse of one-way function employing cipher feedback algorithmScrambling stream generator uses deciphering algorithm connected in output feedback mode (ISO DIS 8372)Combination of three multi-stage line feedback shift registersPicture: two multi-stage linear feedback shift registers Sound: two multi-stage linear feedback shift registers initializing a further multi-stage linear feedback shift registerNon-linear combination of the output of three multi-stage linear feedback shift registers (13,11,8 stages each) APPENDIX 2 (continued) Page organized Teletext systemsData broadcasting systemsMAC/packet familyReference in Annex 1 Teletext system A Teletext system BIndependent data lines in Teletext system BLayers 1 to 4 of Teletext system C adopted in France(C-MAC/packet and D2-MAC/packet)Digital sub-carrier/NTSCPseudo-random generator synchronization 4.1First byte following the first US-X-Y sequence of the recordFirst data byte of packet 0 of a designated pageFirst byte of user data in user data blockFirst byte following the initialization modifierStart of each picture frameA timing signal is transmitted as a part of the sound frame control codes. Picture scrambling is started from the picture frame immediately after the timing signal, and sound scrambling is started from the sound scramble frame immediately after the timing signalInitialization word 4.212 bytes56 bits page keyScrambling stream initial variable is single byte at start of data block replicated eight times12 bytes60 bits32 bitsControl word 4.38 random bytes56 bits current system key64 bit user key8 random bytes60 bits being either randomly chosen or a cryptogram of the 256counter32 bits being randomly chosen (the same as the initialization word)Initialization modifier 4.44 bytes following the record headerNot applicableNot applicable4 bytes following the data group headerThe 8 bits frame-countNot applicableEffect Control 3.10Not applicableNot applicableNot applicableNot applicableNot applicablePicture: applicable Sound: not applicable APPENDIX 2 (continued) Page organized Teletext systemsData broadcasting systemsMAC/packet familyReference in Annex 1 Teletext system A Teletext system BIndependent data lines in Teletext system BLayers 1 to 4 of Teletext system C adopted in France(C-MAC/packet and D2-MAC/packet)Digital sub-carrier/NTSCEntitlement checking messages (ECM) 5Designated records with classification numbers FFF and Y11 = 1; byte Y12 gives the index of the control word. Each message is introduced by the sequence US-3/F-3/F and comprises:  3 bytes for the authorization pointer  3 bytes for the control parameter  16 bytes for the encrypted control wordDesignated packets include 22 bits authorization and control parameters, 112 bits encrypted control wordOne type of control block carries a user-data-key to all users who have a valid system key which enables them to decipher itData groups for which GT (data group type, see Recommendation ITURBT.653, Table1a point 4.1) is equal to14. The data groups are constituted of commands, each command identified by a command identifier and a command length identifier and composed of parameters identified by parameter identifier and parameter length identifier; two types of commands are defined: CI = 0: reference to the security module to use; CI 0: entitlement checking command where each parameter carries an ECM and comprises:  3 bytes for the authori-  zation printer  3 bytes for the control parameter 16 bytes for encrypted control wordPackets designated in the service identification channel. In the condi- tional-access system for D2-MAC/packet used among others, on the French direct broadcasting-satellite system TDF1-TDF2, packet coding is in accordance with the provisions of the specifications in EUROCRYPT conditional-access system for the MAC/packet family (March,1989). In the United Kingdom where D-MAC/packet has been adopted, British Satellite Broadcasting will commence BSS operations using the EuroCypher, a conditional-access system for use with the MAC/packet family of transmission formatsPackets transmitted by the data channel within the digital sound frame. The meaning of each bit is defined, but the details are specified by the service providerControl word index 4.5 Byte Y16 of scrambled record for descrambling and byte Y12 of ECM for updatingNot applicableNot applicableNot applicableNot applicable APPENDIX 2 (continued) Page organized Teletext systemsData broadcasting systemsMAC/packet familyReference in Annex 1 Teletext system A Teletext system BIndependent data lines in Teletext system BLayers 1 to 4 of Teletext system C adopted in France(C-MAC/packet and D2-MAC/packet)Digital sub-carrier/NTSCChange of control word and flag 5Bit b8 of byte Y12 of ECMCurrent and new key words included in a designated packet of the user addressingThe correct versions of keys are identified by matching label keys sent with the keys and the data blocks requiring these keysBit b8 of parameter identifier of entitlement checking commandA new control word is transmitted every 256 frames and becomes the current control word when the frame count equals 0A control word is renewed by the timing signal. The minimum renewal interval is 1 sEntitlement management message (EMM) 6Entitlement is currently managed by a videotex system on a telecommunication networkEntitlement is managed by over-air addressing of receiving equipment using shared and unique user addressing packetsEntitlement is managed by over-air addressing of access control module using shared and uniquely addressed data blocks. Data blocks for over-air addressing are multiplexed into same channel as message dataNot yet standardized. Entitlement may be managed by a videotex system on a telecommunication networkPackets designated in the SI channel. For condi- tional access to D2MAC/packet services used among others on the French direct broadcasting-satellite system, TDF1-TDF2, the packets are encoded in accordance with the provisions of the specifications in EUROCRYPT conditional-access system for the MAC/packet family (March,1989). Packets transmitted by the data channel. They can also be distributed using IC cards. The meaning of each bit is defined, but the details are specified by the service provider APPENDIX 2 (end)  Page organized Teletext systemsData broadcasting systemsMAC/packet familyReference in Annex 1 Teletext system A Teletext system BIndependent data lines in Teletext system BLayers 1 to 4 of Teletext system C adopted in France(C-MAC/packet and D2-MAC/packet)Digital sub-carrier/NTSCEntitlement management message (EMM) (continued)In the United Kingdom where D/MAC/packet has been adopted, British Satellite Broadcasting will commence BSS operations using the EuroCypher, a conditional-access system for use with the MAC family of transmission formatsAccess control equipment 7Built into the receiver and including a smart card readerBuilt into the receiver or functionally separate at service provider choiceCompletely contained within security module. Accepts serial data from packet decoder and provides deciphered serial data to userBuilt into the receiver and including a smart card readerFunctionally separated from the other parts of the receiver, by means of an interface to be standardizedFunctionally separated from the other parts of the receiver, by installing it in an IC for exclusive useSecurity module 7Smart card, with interface proposed for ISO standardizationBuilt-in or detachable module or smart cardMicroprocessor based unit loaded with application software to perform all data protocol handling and deciphering algorithmsSmart card with interface proposed for ISO standar-dizationTwo solutions are proposed: the smart card or a built-in moduleBuilt-in module * Radiocommunication Study Group 6 made editorial amendments to this Recommendation in 2002 in accordance with Resolution ITU-R 44. * Examples of implementation of conditional-access systems specifically applied to television satellite broadcasting in France, the United Kingdom and Japan are given in Appendix 2. * See Appendix1 for definitions. ____________________  PAGE 8  DOCPROPERTY "Header" \* MERGEFORMAT Rec. styleref hrefITU-R BT.810  DOCPROPERTY "Header" \* MERGEFORMAT Rec. styleref hrefITU-R BT.810  PAGE 1   PAGE14  DOCPROPERTY "Header" \* MERGEFORMAT Rec. styleref hrefITU-R BT.810  DOCPROPERTY "Header" \* MERGEFORMAT Rec. styleref hrefITU-R BT.810 PAGE15  12L45O![!!!% %%%&&'''())W-_-----..7//000#1<1>6O6BBCC EEmEvE.I8I!ONMLqyz{O| / B sdpYg-$,Ok(g !D"p""#S#{#$$$$$%/&&4'L' (((()*+,(,,--.7/^////0>1\123H5q5Q78::(===>n?((< /7]^7 /]^An??2@@@@5B6BBBBBCD EmEEEFGGH.I>JSJKKL3O4OH/!<l(4O5O6O7O8O9O:O;OO?OKOOOOOOOOs$d9$& #$/Ifa$!s$d9$& #$/If]^a$s$d9$& #$/Ifa$6:9OOOOPTs$V$& #$/Ifa$s$$& #$/Ifa$s$$& #$/Ifa$$$IfTl4rG(O08lGG4 larPPPPPD*s$$& #$/If]a$$$IfTl4֞G(O08l4 las$$& #$/Ifa$PtQQR6T VVs$$& #$/If]^a$6TFTU(U VVVVVVAXIX{XXfYgYhYlYyYzYYYYYZZ\\v]w]_^`^__p_x___________````?aAabbbbcc@czccccffffgggghh=h?h0k1kQkSkkkk B*ph B*phOJQJCJEHmH sH 6mH sH  ]mH sH mH sH mH sH 6QVVW^WWZ C%%s$$& #$/If]^a$s$& #$/If]$$IfTl4֞G(O08l4 laWXAXXfYgYhY<:i$$IfTl4֞G(O08l4 las$$& #$/If]^a$hYiYjYkYlYYYYYYYY s$$Ifa$s$$If]^a$ s$$Ifa$69 YYYYZ{c{d{j{l{y{z{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{||"|$|1|2|?|@|A|B|F|G|I|J|K|O|P|mH sH j5U\mHnHuj0Jj5U\mHnHu0Jj5\mHnHu 0Jj5\j0Jj5U\5\mHnHuj5U\5\B20*PP&P . A!n"n#$n%050*PP&P 0A .!n"#n$n%020*PP&P . A!n"n#$n%0ZDdB0H%(0  # A2֝Ь2|it_D`!Ь2|it_p%(]exx_[~ v1kn4N:mIQN4A]t}:M${{ogwvxW-,Ї(籏q 1Ԣ@PS;E -ids$4C#}3$п~9# ?>'@GQ77ړŗٓן>yoO[?S?Geŷ_{~o=_~7~+oƯo?_/=y_/_oo|_|}o7'oo#,8,?< ˲~}%2T( }(b/oǟ{+xmO}m|<9lPcώqϱo 睁;s]xz;E?ny_?wz,laXIlhXY-/'! ބ qE}<^GG&Y9XD!;SvxY(Pc̪iO>!\XOL" {9V+L[$x'O<#h?<’'x'x'xXnx,fե๰x<zYПx.*JtV{\/g"P(W nhHi;Ŕ4H:>|3#*YD,MK$̑"ZCbŋo -()-;DG(Qry38X۬ x:4f$!C5Cf]}O)FŤӋ}y'-)J9+*vOlszвT|{S&ѳ7Gcݜ[qGtU;}[zDR)A=N]cC SByH( ![EGyS ">3-{G+;};8v@ppS3Dz19Y7B2.u+Q{μ$h!=B{S}vD>ǟRfQ²0e:tf .x.+lk%r&|֊, >{/ms!^̚5d 9UKdy9x.5T|nWmssAmww3+T)yYe|VtS]WM󪽱6cEY%CvWE.-p /_caxĥӵXLlB\>-"r ^jMhk?-2_5nHmsn>zbUkݛF\|~GP~x=3^Boн3k{Cq}W.Ss=:Tm.w9L $1Z%$M;B +פ{*b2S{TR_\EW!qn{ٷDs멩B>^)t'i~+^Plu\yX!(oLZB',.j;j|>x^DOX/&*B=鉲'zҊ=hZrh;e?%rlzN(d.l#>N?Ų&<_cs5,{O#~ѲmxW0"[]RzA(Ck੉B=-M;Ӟn2.xk6'S'Zzvg?xI`י]OFq>XaIϻKY=_CeF;B=TzPߍ:zn=x=ψz3?}r$fBURi!'0# w5K>{6}i<޳v5[;|*KKf“ڑ'*=_]'گ0ZZlO Oԧ5Gk;8A/*]B;> G:!(+<ȳ]+O=gލy3=Ѽ7G[x}Gh̞<.(Cx3gѳs`1 ~'xf&1}q&hNU}UԳНyFG~[h˸iwkOIy~螭b8Jӷ KqW`>(&#z\eL+ֻV\Znʇg{{ٿivt/C} <x.?YȂ๨,&'\hbGܠsN g|6 uy_:Oz<'$ tͻ^y}#d| -z¹МT1-bQjO:i+乗E{'ag 犫%MB'vb풞9ӓuys2fwawx..,9>zi<3Ƕ㹨48:,S#=On0 ?_..C B'Om =7l?-B3=m2+l^6tƦ3O:1KU'ݦgMГn-QI㹨l˅)*<ɅyDu|i| [1< B5hٶ=ݼiѧsi=i^R=Wlgh, -:u~٢=Nݢθ8T{FS9(wrnC GyES3= 3r(<74hX rq𼬕gCqFtV^Ϙ*<yhdCC9ԏkiNtXo9!9Rx=zI,6x^~zy? -ސ'1[73fgk_q:@>1S3+,Ob3OTxN=nΖ5+Y.Ө/< |%~U?N/t}1a%ԗMѿW}"*]Q}rykX=]g¹QfƟYO'gvI+؇BF{>e_3Cωo_}pDoO^87 Ć*P<0R `-S0ʼu+).Un@s]=V=u~:ƫk?m~.~ZG=Cr~K{7 \1jdT$xˆL3 S\>}l!sjL:diy/{D!MdO=Y[=#ϝYuA|WXQ\S:ɔe15=CY.g^NO'ox=Гv OAy2LnSϕ#^]~ y@َ=Şwjwm|Ǟt<n`|{~Z Ӄ'x'x'x.nCfy ~Vhy']zB8a=,%ْgZOVcO{j='OPZů՗U)8ϵE7sSj<?29gBO5Ix"LV {ykG6zgMLt@n>p'Sϴ'd˓{f{ZӮQ /|KWn5}LdI 9Ģ31T(M>ҀxG/T"._f MssGm=1S|K,H|YUD/TRs=m2Bo㈘̰\ST!REǷ w^ï@W3/-qC3EOvQ[x*.}6Oyvil}vz*}nxz\iгW=̡?ZړY=O*ϡu{ N^9y\SQ?9ѳ-*ky/"ϥ.Ըg%x.Q.[OwL = hi~n 6쪱 =[!ۖجFQ|'.xCcgBϫ^`,¾#z u=T;IT9I"qwc'4ث ,zI)qWZS]|Nm?֯=y7.C0OElqrtg7,{1_3,: {Lg8\^r_;]deO%)2 x]4z;lXzC{Nv!D:z .]Ik9َMQ|x*ro {?ه jOs7iuM_zxRϹj۲D ๎+[;Zt{G {Mɪ9yW}&zy[65ӡZ ɕyr9OEGÒhA}xbf4~Gq#)S,׊bk?x`n% gbO"A'1>%U 2 H.)'X?7>W{y|iAcJrTD">K,dA824kRuZ63^U67ShˀD>%E56\os{oz}C. ϬҢxh2 -8>unH#|r_O⿺2z:r5K;]͕}sQlwS= Oj]=WP* c˺K}e|lzyzӲg˿"ӄK=Ob<)=Yi'J°mz.~z6s!+zf쉼:7s?Bٍ1 풞ryO=2t]{LS=³xv{ W0S]xveEp<^6C7㘍!+j\ Ow'g@wHΟjA>&-{DMfANXmT WGFoTG}exUeȢHmԞ/&MUZO};xֺԇ^+\<r}O{HrRxqώ<~.>אQ.3m'4 M.߳h^˛kwz[C}Oy⥢z#li{w9&斸ϨWCOLϧLokPSy6B33xkxg{޳{3]}SgC=~o-CZ{dveps=kѿ/eDh?ʩ?JUޫ>{myJ$d?&#HzrăgaC=BMDgVGxfz٫X!=C=m?+6)y֞g]KK=E[&+yGO_0>wTO3/<{Yݎ^ 'TsG;4kyZ}):$7W!!L&Ov(ӄl,!JpnNI_yt-zzҪ3^Ȳ͢ArDODtvLR9Zw!>Io6&<}O<ȧ#࿲Ex/NQJu؝GT<,s1~9G<׋=gvd>nbKyJa -GO Ϻx5|IܽӀ۸xZ<饊[h-qsMOwʺ_xKehv>qs1-*=E7xz^7S <7nu~J,mɓ=E}4LE얞K} OF7)y=I=%z;zy@*x v=x/ y"̢,?U¿co x'}qz-B2yV;}b7mlyW[īgZQ#S=R(zݵH'2%zómhױ="qWz%")G5MxlO"O=m$ _zzs< RODThrї[ڗttܓ\yjyqg. w2yq;\(g}|_hAKGʽ[||N׳<+WDtCV U+ -<yhCN|*OlBiiTgTmd=F[i/T7_azL%jV}Wu _˓X5gxNfA $sEUjM`>x5/yCLJK4z[ᒢ mrZYYp>&k򘌞%彃3݅>{TÍ'c`=dS{]soixRG(>;\eSz\ϼ^S7zNs|zKjNkZ'KK7ٶ=~0Kr+~bdσ<#HuNqRTWwwO ѓǽU)8!.&9ܙ,,.ThStEۂx]I̷q "찤-b(q *e9EgwĊKdω.gh1rl_>k˖G y~!ڐy^48Wg˽<of(oU٧xu*+u/Ϩ#Bss $yjtSyˣIM~p'kd|j&G݁x!-ptyG4 O=橅+I<3Th;Sg3=S:x9 ]v3C|ٞs๎sr sC)7bRK=o 24Gs-=e]&S#?F=;.gʳ C<0#y+@uxyZO4=5xB ӂ'xVDgsks!r^kx&,Smҝz}'خ>4O6!R萋= Sv6/O?xF0|p\G*~b&>{gOG۴/ͷv~_ҍL7Ӟ3r{yTj9sŮxyYt><^H_'nF} yA&qx;'PBc# Y`{7A7ߢj<\PG܏6?R؂gvn}_n9,o?{8\~^u5eOOOϻ<)xx|qQYgO ~B|'x6sPsƝ@sxg;,x/vfGrsOKJwg\ xCxGwzᆵKq],' O㞖o= n׳od^nPj%  <=Cos< V:ͳ?ϑO|'@FOmOi;7A=S <{[ 7qXG7/I4CNƔl^ czj֎Yުe}O{SѶ9ٮ'o_ M E GV= ' W! O^z< :AS=aś]{d}Fa!N77_t{ v=Oek9({^nngo˞XsU쩱\Aa [Y5ü17:Q',Ffk~}_3_&q<=rd a_TV7O7<}MґhyؚiZ&=Oi_:ATYa3ߵu(z"Pmf"Y j]m߳:%}אκxso"TLewz6߳Bdkz*'8D'X/)(Pv==<5\ST iY\ 3D:j6OIkyx"z7#čoc݄ٶO t\-=wWn4=Qk=c)簴-=j&5ySYRX,%x./dSa ޽[0A΀ P&Ug]0N%"ӌ8y~9gمai6=6,`!=Igv~" +O\~ۆ|Qx/OR "}l=gQ?z3xDw =m)v99`rOOOe}GN9^\0Pz:xܳWz2%k;蒞yuM}?{=;=J[ /̍SIetWO2ތ&Zƛٲg4Ɂ!>WkMf!7l593ba\<U81h#O-Oi3Er"CLjgܸxzΘgj/iE'$nY~n+j?qhD<)BOzDLU.OYgűUch wLWdyۮgBqggX>T=D |Mx{}g^'Um9,!ΣgP8n=EŰۆO ʞڒga۱ c}Cxl'Bh">*-{S-_DO߅(zZ_?>}UxTew-d>}㾸'~n^z$ٮgYm)'yShnV=*^{'5x:TtXeY?sN41CϛLvcٞx~ғ_8p3s' iB2UigKx-ˌJ$ID&njys+dqtցaNDx^ƣ8 )rc&{dlńV(jY+xO{yw'vsxt۞""{1OW eX%; Pw;"WvDiF9ل|O79y}>/73mYoQn7ӔOtvXz^Qʚ,":u<%S63L+OKW==KYSړCRhB iO3#J - _wD*S+Έ^4oO+ZN[;{Mx }J_4 }󌷜2Jϖ/5ƻ` +{xWxwg=t-;q9=}WKxJ(UZ|R4!K xZjCg=wj_Z>CπsI*sl=߿\?5ϴ<[2\#˨zٍ'`zڳxbg]Y֨BS4zPGxvىRMfUG?37uzQᣗzٞFL4(}T1s*L,> Z x$+O3Pw OFO_kέ3:\&vmh@4Ҭ<'5$`/]0^zs{'<})\Jdԅ6mv+m̐P[yJͯK&磑 =+~Σ炞Z=m,F$%37sңg=w?===d{Y5zg&MOz lӢ'z.XVeyzl?zEIz~'zxF_gгџ<)z.SlFF=)zaO[OGFOOwӣ'zfy?w<Oo~^=s,ѳaO?%t_gd| `<͖<'Khwͳ4ѓ5zeO sҩ_ճnx/g,F}N~XVJKZl<)zG75dӞO(+ Pʬ=))gmٓh6(4-oϾ=z< SUZjUv3~bV8B;~ec1CI'/{Fu IH,~F&sS_@6 RIh;yB{獭7sO=j[u=;4oz~jѵg}ǺN1h6RҜY~эűdz^{p[ߤ}Ogepua T]+*KUO>xB 67rfxNp>񱇳Da~.9Glf=[3PFOz6=]zgxG ϟz69jMzTp=Zӊ5x=(?D=,г ϐ.׻3{xPxjt"N J{*(MypCss^߯#OB-}P󘈒HM!Ug}Ƽ.ZZwLm+nC)wSQ#Zlg O3w"ƫ 7~YO~[u7z1OSiNRal0S~xBC_DO[yh6ؼf#5o"oO^'tILRn;~ɡ0'o=y{*MxYQ{| {.\/M}oh6n6NEޞ_xEOf a~tyF!Rd=?/gEʎ}~<  o=Λ,f/g'y^ZYya xϾvxV xy뇁'S=>n ()Qp"OOkO܊:2 VvhM=1~1:4x016+.C.|$֟`_ogS?욇T(_ͫVN?ӑiG=a=qrÞˋ~hW!yʞ7ǹxSװzz~矂y/3@9rE:՟՞l<߫gx&ˏ\v<}HE N%̊ E ASu^9)\{:<ͻs,U $T mZv+o`~qω<:%OG&=e4m2u8ԟA+vOx݊ h8.\YIS+}[gadYSl,_);} O19 L8뇫gU{Zk!#3ΆNv%?q艞艞X/'zb=˞|/=oSOQn= MWsH#>\gnxs<$g39{SjÑ@zsy$Sb~!CH =זߠg1qП{yGX'!{婛vxB٠ zG{:޷yoݠgw!g;\qf=:<"~яm~'os='<zNoŸKK oSmsƧ~Ur7uNX0EC3gZ37<]o/_@(fOG'_S풧%l$\iQaETϰ!W J"~gNϳg$xR#ڞMzgGUuckcbPX7'ϳ'fIoN i Obn='_,i"TTGT ?ovqO~Յ6'%EӧЬ~=zZBS|AO+J م&q!:^Te1~lb1$z2HGM< /6i%W#_(匬*_ yW;vvw-z4<.jO|HPS{RBlrCyƭYbQd^iiX(1¿d0!%';}F'AO? N\lCJCJPrtxhv:]Y2},( =g׈/9ns5;9%0lW!; qv1Z~7Ϛ WQb~'z'z'z'z'z'z'z'zCF=[艞[Od[ =qz6]؞'AOسDOϬ@ϝ艞UO zV艞艞虅'oԳls?.)[٠yMz.8=!tгpwlW{i DžfF9GsgfȌw?!PGt95oAω_Sd.3\ZbÞY6x'z}f=zYݷϳfsLS\| /*j#~b=J{k'i69B٘ K{G=aO޸H|!G =;u=z6YSzXܿz.igTSͰ%蹤Gx*|tsAȟPܲȯ_s"ж<&=Z=GNs=RIO#zY'z{}GOό=zfh=G&=-z'wϧ yb=')==7ɛOܳzI6Z:zYO{ɬ蹂ُzId{QϯYD'%;zd虳@O? zg=s]^߷=syOÞ.{Z]Os=.I=3B=/39OO;?O˯VMZ>~Fx\~,=s͞=~y6<==I艞艞xޝ_'3lsSѳQeNܝ7?jQmG<>{ZÞ=4 =1{lDpL29׹,*,Q``tvDz1OC<%<`3o jy<0B KU-G(i<<;?LNw$;C58xR-I $3==sjn?lƳUS^ÖPSR'\l4fY=~WW)T <&=^)=NбGC՞qO'ժ0ګP2GDڈEO'3z =O䒞$zza̳ 3ƻn=5Gv쮲k`x¼x=ͭd0Ԅ5Ȩ@= !?/}O*'8%O~=;B~%Z1YR7pktGwΥh󬒧'wٙs"_qq163ף{s¯X!kt?JT;K$ 7u2Ҕ'yl<ٞ㧈$0SN9Rٿ&OF^;0'Oibydᬑ1bIbrYs=X2ٞ-+oB5F<)O?H~X'x&p=4SF݄V7z^V]x=6&}GOc# yr;5 &^|H#:{+<Ÿwnifo%^AO7s}B :J@-BkKyބ O1jO< ]“, XxF<9ɓh>))?:Ձ^L5*5{!OOdm9g&l^1j BVYhZcQ&mktPEvwP%W z^\/cf--ٷaW3^jbU51j;m[$Oٻ؂g|9 h2ldǬ{%yCW${ k)چSQ4Oςem= lpZ_9/vD8[ TDRm}K/se,@/|/\Vܔ=P_(#qnxtzV{i0Nmz$z2DO̽GODOz =qﬧ@ODM)Ο艞9WDόMzF=BODOC=sƻC'?O;&sߝAOx'z*DODODODODO==q=BODO?=s=υ_8'zxGO\ɓBOOD ,]O艞۬pDO|:}َDY(=1?1?wsG=?1?=>x~HӞ ={d\ems*|_<وmP:{ ~ JKz`>U/9cDφ} ϧѨ?-![97MLπ d?/O= g]}tAgc-!E0zܓ3u(eAe=':a*y*3&7\fy]]S yŗD<ǧ+s !Cҧ]zu=$t7=z6+l0Ag `\Bb F=W(+sq =W4p+E+*At3Cggzz'BS<%jY$O#Ӑ=U!َH}JLJ7W8z=o;^*fTGxk) 3>ezVMksϙL[{ V\ѳsODʁ'+ !G={Ƀ<[',@0U=X`Crv=߲'F_V$>tYXo߳T:(xW 0NK,eHOTY-5 S ˰z}zWj <ԳXĵt0ѳFYᥨk O#VFOC~vCk/xvMꇙm"<Oggs$=%x:uUz1E~ٟ#}zP7ӆގyn=?8^&O=y7zzمw,Ϟggױپ ~)h,=F.,7O7/AtV^ k gyw~K4\vkiE}=G)2Sov'x^Ӡ-Bte=<3 Y4hL~*t O| e槆5_/59]N(v3lazJ-z#gbQTl5C&&\ݪ==@E=X~NxzDKLJ=K$ ch!z'zb'z'ƃ艁1O\ A'7x==1p=BO@ODO DODO DO@ODO DODO DO@ODO DODO DO@ODO L =q@O艞艞艞艞艁qtch6ex-Fâ'zf===Ş@D>zy7-$9'VTA |ӛ=,)9;" (.? I(UˆMEa TQ9OKI=lE'+ p8 [?Căaѳe$xB 4!"Iifރ'$Z 7U_*L{)'̠(  ޒ@  `m|4m(P4Q];YpT{Y$O4Z*zP*I+e 8NRUou¾o Hnǩ Z4zgy  7A%OzjIwH'ke OJ%;=4R)ܿL x=/F;k=32)Xӎ{g9Cr =#>-s3~_R}=2TUm =a <ͥCO{q8I݈&O>'FZTeeÓٞ֓@)<ƻJz3COy^`ڎS7x C{`=">SP_F8ƫS[!zB xFo֣T^v]gzY%. joꥺŖUO&מ ~`?$zBGs[Ϸ\Js wdfɓØ DUq_ Vߏc_O.B)RYP>}OdiPeot;Nr{, GϮ _ny_:M|Z߫"Pg0{<y¤_>痑J9!y<x ܿRMI09'̹Q6-Kj4#k |jѴt){2Gߪ6ˋ?_PSz !ZąZBkEȒ0OKX*Y)Msq5T] P}HU;ys9%K(E&ϋnFu ]  f`<2z^$VcxSĴKc"y^7/䗚{%=!l<{#6x<FLN 'ܚx/;=;1_j=0:,$jgԳ7 L yuwF캧%vlΚxܳ5*"бT*Pxy^q5i}Z'QgIxgxxP+yx[xzJ\ųJ!z)JQns JD<O> Art_title $$$a$5CJ<O< Normal_after_title!@.!. Index Heading"B 2BFooter# 4CJmHnHu>@B> Header$$ 4%a$<&@Q< Footnote ReferenceCJEHN@bN Footnote Text&$ ^`CJ6r6 Normal Indent '^8O8 enumlev1(P^`44 enumlev2)s^`s,, enumlev3 *4^466 Equation+ 4%222 toc 0, 4%6L1L FirstFooter-(5$7$8$9DH$;mH sH uDD Art_heading .$a$5CJOJQJ2O2 Note/ 4PCJhhASN.110 (4 7n J &5CJOJQJmHnHu22 Source 1$Ha$5CJD2D Title 22 45$7$8$9DH$5&!B& Title 33.1. Title 44 5OJQJF"F Title 1"5 47n 5BOrB Blanc6$$ 4 CJmH sH jrj Table_text?7 247Sn  / J f@@@@@@@@@@@@@@((CJ66 Annex_ref8$$$a$6O6 Table_No9$$hxa$HOH Table_title:$$xa$ 5OJQJ>qr> Table_head;$$PPa$50O0 Appendix_title<,, Appendix_ref=2O2 Call>$$^66*@6 Endnote ReferenceH*`q` Equation_legend'@ 4?P^`?mH sH >O> Figure_NoA$$$a$;00 Figure_titleB6Q26 Body Text 3CxCJaJNBN Figure_legendD$$ 4CJ@@ Figure_without_titleE$Oa href>1> Heading_bG@& ^`@O1@ Heading_iH^`56"" Part_NoI$$ Part_refJ(( Part_titleKBOB Rec_NoL$$$ 4a$CJ6O6 Rec_titleM 5OJQJ6O6 Rec_refNx5CJOJQJ*O* Rec_dateO$a$.. Question_dateP*"* Question_NoQ020 Question_titleR,, Question_refS8B8 Ref_textT^`CJ0B0 Ref_title U$a$$$ Rep_dateV  Rep_NoW&& Rep_titleX"b" Rep_refY$$ Res_dateZ  Res_No[&& Res_title\"" Res_ref](( Section_No^.. Section_title_J1J Special Footer` 7n ;uHqH Table_legendax]^`44 Table_refb$$0a$44 Art_Noc$$$a$CJ.1R. Chap_Nod 5OJQJ(( Chap_titlee^b^ ddate;f 4nOT&P#$-D/M 5\XrX dnum7g 4nOT&P#$-D/M 5\bb dorlang;h 4nOT&P#$-D/M 5\6O6 Table_fini CJmH sH &)@& Page Number`` Line:k$ 4$dN]^a$ CJmH sH *O* Appendix_NolPP toctemp0m 4 U"% {]^ `{HH tocpart(n 4 U"% {^ `{^^ Rec_Title/Ref%o$$$ 4%a$ CJmH sH >> Rec_Title/Datep$ a$NN head_footq 4B*CJmH phsH >> CCIr$$ 4 CJmH sH FO2F Table_Texts$dBdd CJmH sH <B< Comment Textt CJmH sH 1t:\__XtX?K%qt4kGHOPQvi!xfp(/ B s  d p Yg-$,Okg DpS{  !/""4#L# $$$$%&'(())*7+^++++,>-\-./H1q1Q3466(999:n;;2<<<<5>6>B>>>?@ AmAAABCCD.E>FSFGGH3K4K5K6K7K8K9K:K;KK?KKKKKKKKKKKKKL0000000>00(0(0(000000000000000000(0(000000000(0(0(00(0(0(000(0(00000(0(0000000000000000(0(00000A0/0/000(0(0(0(0(0000000000(0(00(0(00(0(0(000l0<0!0000/0/0(H000(H0000(H00(H00/000000000000`090:060s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00i000009060s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00i0009060s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s0s00i009060s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00s0s0s0s0s0s0s00i0000009060@s0@s0@s0@s0@s0@0@s0@s0@s0@s0@s0@s0@s0@0s0s0s0s0s0s0s00@s0@s0@s0@s0@s0@s0@s0@0@s0@s0@s0@s0@s0@s0@s0@0i00000`00@&0@&0@&0 0@0@$0@0@$0@0@$0@$0@$0 0$00@0$000@0n6Tk{P|BM`p ,n?4OOrPPVWhYYZ[\]`^_a__``a0kKkkkClmm3oWssss_ttuvwiyyP|CEFGHIJKLNOPQRSTUVWXYZ[\]^_abcdefghijklmnoO|D!GNO]ko!tU U !t 078FTY!U U !@  @ (  NB  S ?B S  ?(  `  c $ `  c $ &ktv0 wt9;(u9;(u Doc_title Pre_titleRelated_QuestionsRevision_historyGHtFGNtHOQvgp?KKKSSZ)Zcck)kOll&qrrrrrrPsQssttComposition des Publications8C:\Comp\UIT-R\Rec\0810\1992_Corr_dition_2002\0810-e.docComposition des Publications%C:\comp\UIT-R\Rec\BRresult\0810-e.docf-N_XJC K@zB` l4أ,pnj1 53tT]7Mh5h9ZYUGx-1K<x$XR.3 ](@xcnj2[eq[ jt)p*9u f-v4QwxX>*|p]7*@^`h^`OJPJQJo( @^`)hh^h`OJPJQJo( @yW^y`W56>*CJOJQJo(() hh^h`OJPJQJo( @^`@^`56CJOJQJo() h^`OJPJQJo( @^`Th^T`OJPJQJo( @^`)@^`@hh^h`.@^`@^`@^`hh^h`OJPJQJo( @W^`W56>*CJOJQJo() @hh^h`5@0^`0)9unj1`1KC h9f-vl4f-$XR53*|*|N4Qwx(NT]72[eUGN)p ]@xc[ jN@0^`0)4N @ ^`OJQJo(N@hh^h`CJ-KKKKKKKKKKKL7N>dYM8CYc8Y>8d=8888>8cY>ddeYC>dB>d8BBYCYd8>Yddd788dcY8 2 &6-)C52 0&6access systems while taking XYYYNN=NcN8YN>d88Y>8Yd8dc16&'2 _&6into account the different requirements of various broadcast services and transmission systems;8d8d2YXYddd728dY2d8BBYCYc82CYdc8CYYd8N2dB2dYC8ddM2dCdYdYYM82MYCd8XYN2Ydd27CYdN8NN8dd2NdN8YN8 2 p!&6 )[6&'2 &6e)YB 2 L&6 )42 G&6that putting as much common 8dY8>dc888dd=YN>dYd>Yeddj2 ?&6 elements of conditional access as possible into the receivers l>Y8ZYd8N>dB>Yddd888dcY8>YXYYMN>YN>ddNN8c7Y>8d8d=8dY>CXYY8dWBM16&'2 h&6at the outset would give the greatest potential to the general public to access protected services at a Y8:8cY:dc8NY7:dd8d:d8dX98dY:dBYY7YN79dd8Yd78Y7:8d98dY:dYcYCX89ddd88Y98d9YXYYNN:cCd8YX7Yd:NYCc8YYM9Y8:X16&'.2 !&6reduced equipment cost;CYddYYd2Ydc8dYd82YdN87 2 !T &6 )[6&'2 i#&6f)BC 2 i#6&6 )h2 i#G>&6that copyright owners, programme suppliers and service provide8dY8\YdddB8cd8\ddYCN2\dCddCYY]Nddd88XCN\Ycd\NYCd8YY\cBdd8dY/2 i#&6rs desire highly secure CN\dYM7CY\d8dd8d\NXYdCX16&'2 O$_&6broadcast/distribution networks to allow protection of their programmes through access control,dCdYdYYM88c7N8C8dc88dd2cX8dCdN28d2X87d2dCd8YY78cd2dB28dY8C2dBddCYYN29dCdddd2YYYXNN2Ydd8Cc82 2 O$!&6 )Z6&'-2 J&G &6recommendsNYYdYddN 2 J&: &6 )i6&'-#2 (&6that conditional8dY82Yddc878cdY8 2 (&6-)CS2 (0&6access systems for broadcasting services should:XYYYNN1MdN8YN2BdC2eCdYdYYM88dd1NYCd8XYN2Ndcd8d8 2 (&6 )Z6&' 2 )&6)d 2 )&6 )2&2 )G&6be highly secure, dY2d8dd8d2MXYdCY22 2 ) &6 )Z6&' 2 +&6)d 2 +&6 )2A2 +G$&6share the largest number of common eNdYCY28cY28XBdYN82dddYC2dB2Yedd3Y52 +@&6lements in the receiver, and8YYd8N28d27dY2CYYX8dYC21Ydd 2 +&6 )[6&' 2 ?-&6)d 2 ?-&6 )2t2 ?-GF&6be designed according to the fundamental principles listed in Annex 1.dY2dYN8ddYd1YYYdCc8dd28c28dY2BdddYYd8Y82cC8dX8c8YN278N7Yd28d1ddYd2d2 2 ?-W&6 )[6&'6&'-)2 /&6____________________dddddddddddddddddddd 2 / &6 )[6&'I@Times New RomanLSwUSw0-- 2 g1&6*K- 2 |1&6 2 |1]&6Radiocommunication Study Group 6 made editorial amendments to this Recommendation in 2002 in zQ\3\Q]]\3QQ33\\Qf3[[\Q=\\[Q[PQ\QQQ\33\=3Q3QRQ\]Q]3GQ3\Q3[3GQzQQ]Q\\Q33\\Q3[Q\[\\P3[.6&'82 O2&6accordance with Resolution ITUQQQ\=\Q\QQ.33\.zQG\3\33[\.=p 2 O2 &6-=2 O2&6R 44.z.\\. 2 O2&6 R6&'-66&&66&&66&&66&&66&&66&&66&&66&&66&& 6 6& &  6 6& &  6 6& &  6 6& &  6 6& & 66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&&66&& 6 6& & !!6!6&!&!!""6"6&"&""##6#6&#&##$$6$6&$&$$%%6%6&%&%%՜.+,D՜.+, $ ,4<D L *Template: Recommandation UIT-R - ds 2001n CP..2500/NM,International Telecommunication Union (ITU)/r HRECOMMENDATION ITU-R BT.810 - Conditional-access broadcasting systems1 Introduction+2 Component of a conditional-access system 2.1 Scrambling 2.2 Access controlJ3 The requirements to be satisfied by a conditional-access control system 3.1 Quality 3.2 Security% 3.3 Universal conditional access& 3.4 End-to-end content protection 3.5 Access modes" 3.6 Equipment standardization 3.7 Access management0 3.8 Avoidance of impairments to the service, 3.9 Interaction with digital processing 3.10 Effect control54 General description of a conditional-access system 4.1 General 4.2 Initialization word 4.3 Control word 4.4 Initialization modifier 4.5 Control word index'5 Access entitlement checking messages)6 Access entitlement management messages7 Access control equipment Conditional access# Conditional-access control Point of origination Point of presentation Title Headings@ Doc_title Pre_titleRelated_QuestionsRevision_historyHeader BR2001.dots BR2001.dots BR2001.dots BR2001.dotsRec. d  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqstuvwxyz{|}~    Root Entry FPpData rZ1TableN^WordDocumentSummaryInformation(,DocumentSummaryInformation8 CompObjjObjectPoolPpPp  FMicrosoft Word Document MSWordDocWord.Document.89q